| // Copyright 2021 The Wuffs Authors. |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // https://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| |
| // ---------------- |
| |
| // Silence the nested slash-star warning for the next comment's command line. |
| #pragma clang diagnostic push |
| #pragma clang diagnostic ignored "-Wcomment" |
| |
| /* |
| This fuzzer (the fuzz function) is typically run indirectly, by a framework |
| such as https://github.com/google/oss-fuzz calling LLVMFuzzerTestOneInput. |
| |
| When working on the fuzz implementation, or as a coherence check, defining |
| WUFFS_CONFIG__FUZZLIB_MAIN will let you manually run fuzz over a set of files: |
| |
| gcc -DWUFFS_CONFIG__FUZZLIB_MAIN pixel_swizzler_fuzzer.c |
| ./a.out ../../../test/data |
| rm -f ./a.out |
| |
| It should print "PASS", amongst other information, and exit(0). |
| */ |
| |
| #pragma clang diagnostic pop |
| |
| // Wuffs ships as a "single file C library" or "header file library" as per |
| // https://github.com/nothings/stb/blob/master/docs/stb_howto.txt |
| // |
| // To use that single file as a "foo.c"-like implementation, instead of a |
| // "foo.h"-like header, #define WUFFS_IMPLEMENTATION before #include'ing or |
| // compiling it. |
| #define WUFFS_IMPLEMENTATION |
| |
| #if defined(WUFFS_CONFIG__FUZZLIB_MAIN) |
| // Defining the WUFFS_CONFIG__STATIC_FUNCTIONS macro is optional, but when |
| // combined with WUFFS_IMPLEMENTATION, it demonstrates making all of Wuffs' |
| // functions have static storage. |
| // |
| // This can help the compiler ignore or discard unused code, which can produce |
| // faster compiles and smaller binaries. Other motivations are discussed in the |
| // "ALLOW STATIC IMPLEMENTATION" section of |
| // https://raw.githubusercontent.com/nothings/stb/master/docs/stb_howto.txt |
| #define WUFFS_CONFIG__STATIC_FUNCTIONS |
| #endif // defined(WUFFS_CONFIG__FUZZLIB_MAIN) |
| |
| // Defining the WUFFS_CONFIG__MODULE* macros are optional, but it lets users of |
| // release/c/etc.c choose which parts of Wuffs to build. That file contains the |
| // entire Wuffs standard library, implementing a variety of codecs and file |
| // formats. Without this macro definition, an optimizing compiler or linker may |
| // very well discard Wuffs code for unused codecs, but listing the Wuffs |
| // modules we use makes that process explicit. Preprocessing means that such |
| // code simply isn't compiled. |
| #define WUFFS_CONFIG__MODULES |
| #define WUFFS_CONFIG__MODULE__BASE |
| |
| #include <sys/mman.h> |
| #include <unistd.h> |
| |
| // If building this program in an environment that doesn't easily accommodate |
| // relative includes, you can use the script/inline-c-relative-includes.go |
| // program to generate a stand-alone C file. |
| #include "../../../release/c/wuffs-unsupported-snapshot.c" |
| #include "../fuzzlib/fuzzlib.c" |
| |
| const uint32_t pixfmts[] = { |
| WUFFS_BASE__PIXEL_FORMAT__Y, |
| WUFFS_BASE__PIXEL_FORMAT__Y_16BE, |
| WUFFS_BASE__PIXEL_FORMAT__INDEXED__BGRA_NONPREMUL, |
| WUFFS_BASE__PIXEL_FORMAT__INDEXED__BGRA_BINARY, |
| WUFFS_BASE__PIXEL_FORMAT__BGR_565, |
| WUFFS_BASE__PIXEL_FORMAT__BGR, |
| WUFFS_BASE__PIXEL_FORMAT__BGRA_NONPREMUL, |
| WUFFS_BASE__PIXEL_FORMAT__BGRA_NONPREMUL_4X16LE, |
| WUFFS_BASE__PIXEL_FORMAT__BGRA_PREMUL, |
| WUFFS_BASE__PIXEL_FORMAT__BGRX, |
| WUFFS_BASE__PIXEL_FORMAT__RGB, |
| WUFFS_BASE__PIXEL_FORMAT__RGBA_NONPREMUL, |
| WUFFS_BASE__PIXEL_FORMAT__RGBA_PREMUL, |
| }; |
| |
| const wuffs_base__pixel_blend blends[] = { |
| WUFFS_BASE__PIXEL_BLEND__SRC, |
| WUFFS_BASE__PIXEL_BLEND__SRC_OVER, |
| }; |
| |
| // allocate_guarded_page allocates (2 * page_size) bytes of memory. The first |
| // page has read|write permissions. The second page has no permissions, so that |
| // attempting to read or write to it will cause a segmentation fault. |
| const char* // |
| allocate_guarded_page(uint8_t** ptr_out, int page_size) { |
| void* ptr = |
| mmap(NULL, 2 * page_size, PROT_NONE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0); |
| if (ptr == MAP_FAILED) { |
| return "fuzz: internal error: mmap failed"; |
| } |
| if (mprotect(ptr, page_size, PROT_READ | PROT_WRITE)) { |
| return "fuzz: internal error: mprotect failed"; |
| } |
| *ptr_out = ptr; |
| return NULL; |
| } |
| |
| // fuzz tests that, regardless of the randomized inputs, calling |
| // wuffs_base__pixel_swizzler__swizzle_interleaved_from_slice will not crash |
| // the fuzzer (e.g. due to reads or write past buffer bounds). |
| const char* // |
| fuzz(wuffs_base__io_buffer* src, uint64_t hash) { |
| uint8_t dst_palette_array[1024]; |
| uint8_t src_palette_array[1024]; |
| if ((src->meta.wi - src->meta.ri) < 2048) { |
| return "fuzz: not enough data"; |
| } |
| memcpy(dst_palette_array, src->data.ptr + src->meta.ri, 1024); |
| src->meta.ri += 1024; |
| memcpy(src_palette_array, src->data.ptr + src->meta.ri, 1024); |
| src->meta.ri += 1024; |
| wuffs_base__slice_u8 dst_palette = |
| wuffs_base__make_slice_u8(&dst_palette_array[0], 1024); |
| wuffs_base__slice_u8 src_palette = |
| wuffs_base__make_slice_u8(&src_palette_array[0], 1024); |
| |
| size_t num_pixfmts = sizeof(pixfmts) / sizeof(pixfmts[0]); |
| wuffs_base__pixel_format dst_pixfmt = wuffs_base__make_pixel_format( |
| pixfmts[(0xFF & (hash >> 0)) % num_pixfmts]); |
| wuffs_base__pixel_format src_pixfmt = wuffs_base__make_pixel_format( |
| pixfmts[(0xFF & (hash >> 8)) % num_pixfmts]); |
| |
| size_t num_blends = sizeof(blends) / sizeof(blends[0]); |
| wuffs_base__pixel_blend blend = blends[(0xFF & (hash >> 16)) % num_blends]; |
| |
| size_t dst_len = 0xFF & (hash >> 24); |
| size_t src_len = 0xFF & (hash >> 32); |
| |
| wuffs_base__pixel_swizzler swizzler; |
| wuffs_base__status status = wuffs_base__pixel_swizzler__prepare( |
| &swizzler, dst_pixfmt, dst_palette, src_pixfmt, src_palette, blend); |
| if (status.repr) { |
| return wuffs_base__status__message(&status); |
| } |
| |
| int page_size = getpagesize(); |
| if (page_size < 0x100) { |
| return "fuzz: internal error: page_size is too small"; |
| } |
| |
| static uint8_t* dst_alloc = NULL; |
| if (!dst_alloc) { |
| const char* z = allocate_guarded_page(&dst_alloc, page_size); |
| if (z != NULL) { |
| return z; |
| } |
| } |
| |
| static uint8_t* src_alloc = NULL; |
| if (!src_alloc) { |
| const char* z = allocate_guarded_page(&src_alloc, page_size); |
| if (z != NULL) { |
| return z; |
| } |
| } |
| |
| // Position dst_slice and src_slice so that reading or writing one byte past |
| // their end will cause a segmentation fault. |
| if ((src->meta.wi - src->meta.ri) < (dst_len + src_len)) { |
| return "fuzz: not enough data"; |
| } |
| wuffs_base__slice_u8 dst_slice = |
| wuffs_base__make_slice_u8(dst_alloc + page_size - dst_len, dst_len); |
| memcpy(dst_slice.ptr, src->data.ptr + src->meta.ri, dst_len); |
| src->meta.ri += dst_len; |
| wuffs_base__slice_u8 src_slice = |
| wuffs_base__make_slice_u8(src_alloc + page_size - src_len, src_len); |
| memcpy(src_slice.ptr, src->data.ptr + src->meta.ri, src_len); |
| src->meta.ri += src_len; |
| |
| // Calling etc__swizzle_interleaved_from_slice should not crash, whether for |
| // reading/writing out of bounds or for other reasons. |
| wuffs_base__pixel_swizzler__swizzle_interleaved_from_slice( |
| &swizzler, dst_slice, dst_palette, src_slice); |
| |
| return NULL; |
| } |